Analysis
-
max time kernel
155s -
max time network
145s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
21-09-2021 08:38
Static task
static1
Behavioral task
behavioral1
Sample
bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe
Resource
win7-en-20210920
General
-
Target
bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe
-
Size
852KB
-
MD5
41deb852009dee8341b1862142c45e79
-
SHA1
29d04c1ab468338690fd75e11a595ba3a52a0b11
-
SHA256
bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6
-
SHA512
d5eb21bca7661ec9d1ae35f804b8c0e5282db2ebab3bfb5f85bee45323a38418021143b71e1b1d6dc66592c81034d6657315923ddb9db678d3956b1ed23e905d
Malware Config
Extracted
asyncrat
0.5.7B
Default
20.203.178.116:2070
AsyncMutex_6SI8OkPnk
-
anti_vm
false
-
bsod
false
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
null
Signatures
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1652-55-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1652-56-0x000000000040C70E-mapping.dmp asyncrat -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\OiwW73X0viQiRyHi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe" bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exedescription pid process target process PID 1376 set thread context of 1652 1376 bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005f45a3407a6eee4cb6062dddd85478a600000000020000000000106600000001000020000000252fd66b11ed8e3c53fe650eff7312f2d60050eccea51e2d7723444cf1d7ae4b000000000e8000000002000020000000bbeebee71a0ef125407ea683b921dbe6edcee2560e2d3486455820cca8ea61e7200000001f990c90e6af340e6f3f6ec7479ac555c7b9346f9c4601baade2efc903bc3c89400000002049227670bca0445f49b03129cd7bef83d8a081cf23f4541af49f24605d54f5c5de27c96edba6349965c03052dc6657bcf35a6ba80cb5e50a32580c1937e2e4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "338978489" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4EB438F1-1AB7-11EC-838B-52A3F155B9B8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0822728c4aed701 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1696 iexplore.exe 1696 iexplore.exe 468 IEXPLORE.EXE 468 IEXPLORE.EXE 468 IEXPLORE.EXE 468 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exesvchost.exeiexplore.exedescription pid process target process PID 1376 wrote to memory of 1652 1376 bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe svchost.exe PID 1376 wrote to memory of 1652 1376 bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe svchost.exe PID 1376 wrote to memory of 1652 1376 bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe svchost.exe PID 1376 wrote to memory of 1652 1376 bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe svchost.exe PID 1376 wrote to memory of 1652 1376 bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe svchost.exe PID 1376 wrote to memory of 1652 1376 bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe svchost.exe PID 1376 wrote to memory of 1652 1376 bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe svchost.exe PID 1376 wrote to memory of 1652 1376 bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe svchost.exe PID 1376 wrote to memory of 1652 1376 bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe svchost.exe PID 1652 wrote to memory of 1696 1652 svchost.exe iexplore.exe PID 1652 wrote to memory of 1696 1652 svchost.exe iexplore.exe PID 1652 wrote to memory of 1696 1652 svchost.exe iexplore.exe PID 1652 wrote to memory of 1696 1652 svchost.exe iexplore.exe PID 1696 wrote to memory of 468 1696 iexplore.exe IEXPLORE.EXE PID 1696 wrote to memory of 468 1696 iexplore.exe IEXPLORE.EXE PID 1696 wrote to memory of 468 1696 iexplore.exe IEXPLORE.EXE PID 1696 wrote to memory of 468 1696 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe"C:\Users\Admin\AppData\Local\Temp\bacd5989c0f8aebcceb4f6268ed626d587d324c91ab45799c5c05d03f196e1d6.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:468
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ab5c36d10261c173c5896f3478cdc6b7
SHA187ac53810ad125663519e944bc87ded3979cbee4
SHA256f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9
SHA512e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
MD5553880ec4ff6ecb1093944d2418feaf8
SHA1d7591b44a2c0eadc4b551bc7410dbb74de58f8f1
SHA25697e10014e3a67177d84564d6ef7bf8111e587569f50f838e553d850b603d97e0
SHA5128e674357d839b7bb9bdd6813a917fb229857a47ec755efed0c796ca06a4c6995740521bbce7a643548bd54c27c5f5c3bdeb650b6f3cfede3680b434aa9069338
-
MD5
1438bd6950d90e091a4903cfcf1e15ba
SHA16bf85172675487920b4c50778d5fa843f6d878ae
SHA256ce679775c43e449406ba3dcc1a37a2324365056db60923a9bf888afff51c551e
SHA5122a24a30172e18bdb81692c95f3c1ee37a26e8d57959d20cb7e6545660d97bb02aa859c39ef3c28555920ebb273b3747412de3e8809b42e04589dc9e8eb039642
-
MD5
a795e150d58c70e2141f50d81c11d4ab
SHA157d5b3b8355f6550e45c4155c33d83db46f95d7e
SHA2567388c903fea1ed131ca2011d821c8df16845d206836373746f9d18d3df95bdf0
SHA512911b142d8e88735796d6de2e09b0ee8baa2a225dc945f96d1a72e1c3403fc384b36d10755a5427cf2f5842e4de65c9ad88ec09e0ba4ab17c5addbb61bb8f3b93